Overview
It’s the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
on what’s new and improved, with a particular focus on the security features,
plus we cover a high priority vulnerability in libksba as well.
This week in Ubuntu Security Updates
[USN-5672-1] GMP vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-43618 [USN-5673-1] unzip vulnerabilities
3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-0530 CVE-2022-0529 CVE-2021-4217 [USN-5674-1] XML Security Library vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2017-1000061 [USN-5675-1] Heimdal vulnerabilities
4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-3116 CVE-2021-3671 CVE-2019-12098 CVE-2018-16860 [USN-5677-1] Linux kernel vulnerabilities
11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-36879 CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-3176 CVE-2022-26373 CVE-2022-26365 CVE-2022-2318 CVE-2022-20369 CVE-2021-4159 [USN-5678-1] Linux kernel vulnerabilities
9 CVEs addressed in Bionic (18.04 LTS)CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-2318 CVE-2022-32296 CVE-2022-1012 CVE-2022-0812 [USN-5679-1] Linux kernel (HWE) vulnerabilities
9 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-2318 CVE-2022-32296 CVE-2022-1012 CVE-2022-0812 [USN-5676-1] PostgreSQL vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2022-1552 [USN-5680-1] gThumb vulnerabilities
2 CVEs addressed in Focal (20.04 LTS)CVE-2020-36427 CVE-2019-20326 [USN-5682-1] Linux kernel (AWS) vulnerabilities
11 CVEs addressed in Bionic (18.04 LTS)CVE-2022-36879 CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-3176 CVE-2022-26373 CVE-2022-26365 CVE-2022-2318 CVE-2022-20369 CVE-2021-4159 [USN-5683-1] Linux kernel (IBM) vulnerabilities
16 CVEs addressed in Jammy (22.04 LTS)CVE-2022-39189 CVE-2022-36946 CVE-2022-36879 CVE-2022-34495 CVE-2022-34494 CVE-2022-33744 CVE-2022-33743 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-3176 CVE-2022-26373 CVE-2022-26365 CVE-2022-2318 CVE-2022-1882 CVE-2021-33655 [USN-5684-1] Linux kernel (Azure) vulnerabilities
9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-2318 CVE-2022-32296 CVE-2022-1012 CVE-2022-0812 [USN-5570-2] zlib vulnerability
1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-37434 [USN-5685-1] FRR vulnerabilities
2 CVEs addressed in Jammy (22.04 LTS)CVE-2022-37035 CVE-2022-37032 [USN-5686-1] Git vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-39260 CVE-2022-39253 [USN-5687-1] Linux kernel (Azure) vulnerabilities
9 CVEs addressed in Bionic (18.04 LTS)CVE-2022-33744 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-2318 CVE-2022-32296 CVE-2022-1012 CVE-2022-0812 [USN-5688-1] Libksba vulnerability [01:24]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-3515 libksba library used to parse and build ASN.1 objects contained within S/MIME,X.509 certificates etc
ASN.1 supports various encoding formats - BER, DER (basic and distinguisedencoding rules respectively)
Both use a tag-length-value scheme to encode objectsWhen copying these objects around, would copy both a header as well as theobject itself - if an object was really large, the sum of the header size plus
the object would overflow - allowing a size check to be bypassed (since when
overflowing wraps around to be a small sized integer)
Integer overflow leading to a buffer overflowConsidered a severe bug by upstreamin Ubuntu is used by gpgsm (used to handled SMIME signed data) and dirmngr -responsible for parsing and loading CRLS and verifying certs used by TLS
Goings on in Ubuntu Security Community
Ubuntu 22.10 Kinetic Kudu release [04:02]
https://ubuntu.com/blog/canonical-releases-ubuntu-22-10-kinetic-kudukernel 5.19security wiseFaster RNG (entropy extraction switched from SHA1 to BLAKE2)Support for Intel Trust Domain Extensions (TDX)successor to SGX, builds on lessons learnedvirtualisation based confidential computing environmentequivalent to an SGX enclaveuses a new processor mode called SEAMallows to deploy legacy applications without having to adapt them adifferent programming model as was done for SGX
AppArmor support for posix-mq and unprivileged user namespace mediationidea is that only applications which are running under an AppArmor profilewith permission to user userns will be able to - unconfined will not -
this kernel configuration is disabled by default but can be enabled via a
sysctl:
then unconfined applications will not be able to use themhelps limit an attack surface for exploits - 4 out of 5 pwn2own exploitsagainst Ubuntu this year used unprivileged userns as part of their attack
chain
sudo sysctl -w kernel.apparmor_restrict_unprivileged_userns=1
Desktoppipewire is now default instead of pulseaudio - improved bluetooth handlingGNOME 43 - gedit replaced by gnome-text-editor, gnome-terminal still therebut likely will be new gnome-console in 23.04
LibreOffice 7.4FF 106/ TB 102Updated bluez, CUPS, network-manager, Mesa 22 etcServersocket-activated SSH daemon to reduce memory footprint inside containers etcimproved support for integration with Windows Server w/ LDAP channel binding and LDAP signing in cyrus-sasl2bind9 support for remote TLS verification in both named and dig to allow to implement strict and mutual TLS authenticationupdated containerd, runc, docker.ioupdated qemu - improved emulation of RISC-V, s390xupdated libvirt - ppc64 Power10 processor supportFor developers:debuginfodupdated gcc, Go, Ruby and Rust toolchainsCanonical Product Roadmap + Engineering Sprints + Ubuntu Summit [12:32]
No podcast for the next 3 weeksThanks and farewell to Shaun Murphy [13:45]
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter